Reed Elsevier

Displaying 1-40 of 899 results

  • White Papers // Apr 2015

    T-CREST: Time-Predictable Multi-Core Architecture for Embedded Systems

    Real-time systems need time-predictable platforms to allow static analysis of the Worst-Case Execution Time (WCET). Standard multi-core processors are optimized for the average case and are hardly analyzable. Within the T-CREST project the authors propose novel solutions for time-predictable multi-core architectures that are optimized for the WCET instead of the...

    Provided By Reed Elsevier

  • White Papers // Apr 2015

    Dataflow Formalisation of Real-Time Streaming Applications on a Composable and Predictable Multi-Processor SOC

    Embedded systems often contain multiple applications, some of which have real-time requirements and whose performance must be guaranteed. To efficiently execute applications, modern embedded systems contain Globally Asynchronous Locally Synchronous (GALS) processors, network on chip, DRAM (Dynamic Random-Access Memory) and SRAM (Static Random-Access Memory) memories and system software, e.g. microkernel...

    Provided By Reed Elsevier

  • White Papers // Feb 2015

    Characterization of the Windows Kernel Version Variability for Accurate Memory Analysis

    Memory analysis is an established technique for malware analysis and is increasingly used for incident response. However, in most incident response situations, the responder often has no control over the precise version of the operating system that must be responded to. It is therefore critical to ensure that memory analysis...

    Provided By Reed Elsevier

  • White Papers // Feb 2015

    The Brain in Your Pocket: Evidence That Smartphones Are Used to Supplant Thinking

    Technological advances have long figured prominently in the history of psychological science. Smartphones seem to represent another technology that can fundamentally change psychology, though unlike neuroimaging or computational technology that afforded new ways of answering old questions; this advance interacts with, and might also change, the very thing which the...

    Provided By Reed Elsevier

  • White Papers // Nov 2014

    The Effect of Data Pre-Processing on Optimized Training of Artificial Neural Networks

    Recently, the popularity of Artificial Neural Networks (ANNs) is increasing since its capacity to model very complex problems in the area of machine learning, data mining and pattern recognition. Improving training efficacy of ANN based algorithm is a dynamic area of research and several papers have been reviewed in the...

    Provided By Reed Elsevier

  • White Papers // Nov 2014

    Exploration on Building the Campus Information Center for Cloud Computing

    Recently, the popularity of Artificial Neural Networks (ANNs) is increasing since its capacity to model very complex problems in the area of machine learning, data mining and pattern recognition. Improving training efficacy of ANN based algorithm is a dynamic area of research and several papers have been reviewed in the...

    Provided By Reed Elsevier

  • White Papers // Oct 2014

    Multi Core SSL/TLS Security Processor Architecture Prototype Design with Automated Preferential Algorithm in FPGA

    In this paper, a pipelined architecture of a high speed Network Security Processor (NSP) for SSL/TLS protocol is implemented on a System-on-Chip (SoC) where hardware information of all encryption, hashing and key exchange algorithms are stored in flash memory in terms of bit files, in contrary to related works where...

    Provided By Reed Elsevier

  • White Papers // Oct 2014

    Comparison of High Level FPGA Hardware Design for Solving Tri-Diagonal Linear Systems

    Reconfigurable computing devices can increase the performance of compute intensive algorithms by implementing application specific co-processor architectures. The power cost for this performance gain is often an order of magnitude less than that of modern CPUs and GPUs. Exploiting the potential of reconfigurable devices such as Field-Programmable Gate Arrays (FPGAs)...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Using Quantum Key Distribution for Cryptographic Purposes: Asurvey

    "The appealing feature of Quantum Key Distribution (QKD), from a cryptographic viewpoint, is the ability to prove the Information-Theoretic Security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Rank B2C e-Commerce Websites in e-Alliance Based on AHP and Fuzzy TOPSIS

    E-alliance is the union of e-commerce and its success and efficiency is related to comprehensive quality of e-commerce. Thus, ranking e-commerce websites in e-alliance is of importance, which is a Multi-Criteria Decision-Making (MCDM) problem. This paper proposes an evaluation model based on Analytic Hierarchy Process (AHP), fuzzy sets and Technique...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Quality Management of B2C e-Commerce Service Based on Human Factors Engineering

    In this paper, the authors investigate Business-To-Customer (B2C) electronic commerce services from a quality management perspective. They propose a novel quality management approach that is based on human factors engineering to manage e-commerce service quality and operate according to customer needs. First, they screen credible quality requirements and determine their...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    The Effects of Personality Traits and Website Quality on Online Impulse Buying

    Depending on the improvements of information technology e-commerce and e-marketing have become very important concepts, making online shopping very popular. As a result of the proliferation of e-commerce and online shopping, "Online impulse buying" has become an emerging phenomenon. Taking the lack of studies on online impulse buying into consideration...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks Using AODV Protocol

    "MANETs are susceptible to various attacks. Out of which Denial of Service (DoS) are most dangerous and very difficult to detect and defend. Jellyfish is a new DoS attack categorized as JF reorder attack, JF periodic dropping attack and JF Delay variance attack. In JF delay variance attack, a JF...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Framework for Evaluating Web Service Based on Threat Patterns

    "The authors present a new methodology for web service to address the security issues and proposed a new computation technique which optimizes complex problem into smaller sub problems that can be solved more efficiently. In this paper, they present a study on vulnerability scanners to detect security vulnerabilities in publicly...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Design of High Speed Reconfigurable Coprocessor for Next Generation Scrambler and De-Scrambler System

    In this paper, the authors present the high speed Reconfigurable Co-processor for scrambler and de-scrambler system. In a communication system more number of data will be transmitted through a media that transmitted data will be more secure and authenticated. with the help of scrambler device a some unknown data to...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Dynamic Clustering to Detect Malicious Nodes in Wireless Sensor Network

    "Wireless sensor networks are vulnerable to many types of attacks that disturb the normal behavior of the network. These attacks occur because of the presence of malicious nodes in the network that advertise false information among the nodes and disrupt normal operations of the network. This paper proposes a mechanism...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Approaches to Parallelization of NLP Tasks in a Search System

    "The large web expanding every moment poses at least three important challenges - scale (processing of enormous amounts of data), processing speed, and relevance (ability to extract relevant information). Research in information extraction and search systems strive to handle one or more of these challenges. A key element in all...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Comprehensive Analysis of Requirement Engineering Approaches in a Data Warehouse Environment

    "Data warehouses contain vast amount of data generated from different sources. In order to maintain data in the data warehouse according to the organization some designing approaches are important. In data warehouse systems, Requirement Engineering (RE) is a crucial part of the software development process. Requirement engineering is a sub...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Adopting Dendritic Cell Algorithm to Conform a Hybrid Intrusion Detection System

    Artificial Immune System (AIS) is applied to hybrid Intrusion Detection System (IDS). A hybrid IDS is inspired by the concept of danger theory of human immune system is proposed in this paper and works for both host as well as network. The idea behind this hybrid IDS is based on...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Template-Based Human Detection and Feature-Based Tracking

    "Automatic video surveillance is seeing widespread use in the remote monitoring of people. When the authors are dealing with automatic video surveillance, classification of detected objects and tracking them are the most crucial processes. This paper proposes a human tracking system for static background, which first classifies all incoming objects...

    Provided By Reed Elsevier

  • White Papers // Jan 2014

    Video Surveillance System for Security Applications

    "Computer Vision (CV), or image understanding, seeks to replace human interpretation with computer-based interpretation. Computer Vision deals with the automatic analysis, reconstruction, and recognition of objects in a scene from one or more images. Basically a video surveillance system deals with detection of unusual motion. The efficiency of video surveillance...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Evolvable Hardware: A Synthesis and Analysis Using Different Evolutionary Strategies

    In this paper, Cartesian genetic algorithm with evolutionary strategies are used to synthesize digital circuits like full adder and 2 bit multiplier, constructed with only universal gates. The fitness function and different crossover techniques are also such used that minimum gates are utilized. The Genetic Algorithms (GA) with evolutionary strategies...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher

    "The rapid development of multimedia and network technology has promoted the use of digital images and videos being transmitted over internet and wireless network more and more frequently. So the security of digital images and videos is needed in many applications. Recently a triple key encryption method based on logistic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Security Solution to Protect SCADA Systems from Cyber Attacks

    "Supervisory Control And Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and initiate supervisory...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    End-to-End QoS Mapping Between UMTS and WiMAX in Loose Coupling Heterogeneous Wireless Network

    "One of the main objectives of Heterogeneous Wireless Access Networks (HWANs) is to integrate the different wireless access technologies, such as UMTS, WiMAX and WLAN, with a common IP-based network in order to offer mobile users continuous and unified service in a transparent way. However, one of the major issues...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Object Oriented Approach to Anatomy of Intrusion Detection System

    "Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors'...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Congestion Control for Computer Networks Using Weighted Random Early Detection (WRED)

    "Computer network is a set of computers and hardware components linked together to communicate with each other. Congestion in networks occurs when at any node there is more data traffic than the outgoing link capacity. Effects of congestion are packet delay, packet drop, reduced system throughput and degraded quality of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Augmenting Naïve Bayes Classifier With Domain Knowledge in Detecting Malware

    "Malicious software attacks on the Internet are on the rise in both frequency and sophistication. The use of Naïve Bayes technique has been shown to be capable to detect malware. This paper proposes the usage of domain knowledge in the algorithm to improve detection accuracy. The domain knowledge consists of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Enhanced Security Framework for Cloud Computing

    "Cloud computing provides large scale pool of resources, wide access, dynamicity, cost effective solution for storage. Public, private and hybrid deployment models exist for cloud computing along with various service models like integration as service, database as service, and security as service. Though cloud computing is being adopted as the...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Impact of MAC Protocol Over the Performance of Routing Protocol in MANET

    "MANET is an unstructured network formed dynamically between a set of mobile nodes. Routing is a challenge for this network due to its dynamic topology as well as resource constraints. Many routing and MAC layer protocols have been proposed in the network history and most of the researches are under...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Mobile Ad Hoc Network Research Areas : A Step Ahead

    "A Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that dynamically self organize in a wireless network without using any preexisting infrastructure. In a MANET, the applications are typically ""Peer-to-peer"" rather than ""Client-server"". In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    TCP-P: A New Approach in Wireless Environment to Solve Issues Currently TCP Facing

    "TCP is a reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the bit error rate is really low and the authors assume that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from some significant issues like...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Secure Authentication Key Agreement Protocol for Long Term Evolution - Advanced

    "The Authentication and Key Agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Stability History Based Route Selection Using K-Means Clustering in Mobile Adhoc Networks

    "In Mobile Ad-hoc NETworks (MANETs) there is no fixed communication infrastructure, so it allows more flexible model of communication than traditional networks. For any active connection in such a networks, the end hosts as well as the intermediate nodes, which relay the information, can be mobile. Because of this dynamic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Optimized

    "A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes in which different routing protocols are used to form the communication network. So, far there are numerous routing protocols are discovered in which AODV performs superior than all. Ad-hoc network suffer from the bunch of issues in which...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Reduction Fuzzy Data Set Based on Rough Accuracy Measure

    "Attribute reduction is very important in rough set because it used to simplify the induced decision rules without reducing the classification accuracy. In rough set theory, a reduct is generally defined as a minimal subset of attributes that can classify the same domain of objects as unambiguously as the original...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Comprehensive Study of Requirements for Network Applications and Routing Protocols Providing Resources in Vehicular AD HOC Networks

    "Vehicular ad hoc networks are special form of mobile ad hoc networks which have more dynamic topology than MANETs but the nodes move in a preordered fashion. Due to the high mobility and complex dynamics in real vehicular traffic flow, reliable streaming of data over vehicular ad hoc networks is...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Prediction of Peak Ground Acceleration (PGA) Using Artificial Neural Networks

    "In this paper, the probable range of the horizontal component of Peak Ground Acceleration (PGA) is predicted as a function of focal depth, earthquake magnitude and epicentral distance, using Artificial Neural Network (ANN). Three different ANN architectures (namely feed forward, back propagation and radial bias networks) are used to develop...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Novel 3-D FPGA Architecture Targeting Communication Intensive Applications

    The interconnection structures in FPGA (Field Programmable Gate Array) devices increasingly contribute more to the delay, power consumption and area overhead. The demand for even higher clock frequencies makes this problem even more important. Three-Dimensional (3-D) chip stacking is touted as the silver bullet technology that can keep Moores momentum...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Classification and Analysis on Routing Nodes in MANET Using Fuzzy Proximity Relation With Ordering and Formal Concept Analysis

    "Routing information plays a vital role in Mobile Ad-hoc NETwork (MANET). In MANET, each node maintains routing information that assists the routing process. Routing nodes and their routing attributes are essential in determining the performance of MANET. Thus, it is necessary to obtain knowledge on routing nodes and their attributes....

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    Ferret: An RFID-Enabled Pervasive Multimedia Application

    This paper presents the design and implementation of Ferret, a system for locating nomadic augmented with RFID tags and visually displaying them to a user in real-time. The authors present a novel algorithm to infer location of tagged objects using the location of a camera and reader that observes them....

    Provided By Reed Elsevier

  • White Papers // Nov 2009

    Sandpiper: Black-Box and Gray-Box Resource Management for Virtual Machines

    Virtualization can provide significant benefits in data centers by enabling dynamic virtual machine resizing and migration to eliminate hotspots. The authors present Sandpiper, a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources, resizing virtual machines to their new allocations,...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Supporting Real-Time Traffic in Multihop Vehicle-to-Infrastructure Networks

    In this paper, a new Controlled Vehicular Internet Access protocol with QoS support (CVIAQoS) is introduced. CVIA-QoS employs fixed gateways along the road which perform periodic admission control and scheduling decisions for the packet traffic in their service area. The CVIA-QoS protocol is based on Controlled Vehicular Internet Access (CVIA)...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Second Order Centrality: Distributed Assessment of Nodes Criticity in Complex Networks

    A complex network can be modeled as a graph representing the ''Who knows who" relationship. In the context of graph theory for social networks, the notion of centrality is used to assess the relative importance of nodes in a given network topology. For example, in a network composed of large...

    Provided By Reed Elsevier

  • White Papers // Jan 2010

    SocialVPN: Enabling Wide-Area Collaboration With Integrated Social and Overlay Networks

    Trusted collaborative systems require peers to be able to communicate over private, authenticated end-to-end channels. Network-layer approaches such as Virtual Private Networks (VPNs) exist, but require considerable setup and management which hinder the establishment of ad-hoc collaborative environments: trust needs to be established, cryptographic keys need to be exchanged, and...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Revising Centralized Certificate Validation Standards for Mobile and Wireless Communications

    Significant specification effort has been contributed on the issue of certificate validation in traditional networking. The emergence of mobile and ubiquitous computing brought about new requirements and limitations. Providing Certificate Status Information (CSI) in such restricted environments is necessary for trust and security. In this paper, the authors review standards'...

    Provided By Reed Elsevier

  • White Papers // Feb 2009

    A Survey on MAC Protocols for Cognitive Radio Networks

    In Cognitive Radio (CR) networks, identifying the available spectrum resource through spectrum sensing, deciding on the optimal sensing and transmission times, and coordinating with the other users for spectrum access are the important functions of the Medium Access Control (MAC) protocols. In this survey, the characteristic features, advantages, and the...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    End-to-End Protocols for Cognitive Radio Ad Hoc Networks: An Evaluation Study

    Cognitive Radio Ad Hoc Networks (CRAHNs) constitute a viable solution to solve the current problems of inefficiency in the spectrum allocation, and to deploy highly reconfigurable and self-organizing wireless networks. Cognitive Radio (CR) devices are envisaged to utilize the spectrum in an opportunistic way by dynamically accessing different licensed portions...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    A Survey on Bio-Inspired Networking

    The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sensor and actor networks, quantum communication networks, terrestrial next generation Internet, and InterPlaNetary Internet. However, there exist many common significant challenges to be addressed for the practical realization...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    A Distortion-Minimizing Rate Controller for Wireless Multimedia Sensor Networks

    The availability of inexpensive CMOS cameras and microphones that can ubiquitously capture multimedia content from the environment is fostering the development of Wireless Multimedia Sensor Networks (WMSNs), i.e., distributed systems of wirelessly networked devices that can retrieve video and audio streams, still images, and scalar sensor data. A new cross-layer...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    Cooperative Spectrum Sensing in Cognitive Radio Networks: A Survey

    Spectrum sensing is a key function of cognitive radio to prevent the harmful interference with licensed users and identify the available spectrum for improving the spectrum's utilization. However, detection performance in practice is often compromised with multipath fading, shadowing and receiver uncertainty issues. To mitigate the impact of these issues,...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    BorderSense: Border Patrol Through Advanced Wireless Sensor Networks

    The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks...

    Provided By Reed Elsevier

  • White Papers // Oct 2010

    MISE-PIPE: Magnetic Induction-Based Wireless Sensor Networks for Underground Pipeline Monitoring

    Underground pipelines constitute one of the most important ways to transport large amounts of fluid (e.g. oil and water) through long distances. However, existing leakage detection techniques do not work well in monitoring the underground pipelines due to the harsh underground environmental conditions. In this paper, a new solution, the...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    On a Moving Direction Pattern Based MAP Selection Model for HMIPv6 Networks

    In a large-scale mobile IPv6 network, usually there are several coexisting Mobility Anchor Points (MAPs) for networking robustness and traffic sharing. Therefore, it is a challenging issue for an arriving mobile node to choose the most appropriate MAP to bind. This task must be carried out by considering the issues...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Optimal Sensor Positioning for Large Scale Metrology Applications

    As it strongly affects the system performance in measuring 3D point coordinates, beacon positioning represents a challenging issue in large scale metrology applications based on wireless sensor networks. This paper presents a software-assisted procedure for efficient placement of ultrasonic beacons in a wireless distributed network-based system for medium - large...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Indoor Deployment of IEEE 802.11s Mesh Networks: Lessons and Guidelines

    Emerging Wireless Mesh Networks (WMNs) are known for their fast and low cost deployment. Conventional mesh deployment focuses on the outdoor environment, which regards the WMNs as backbone networks. This study deploys and measures indoor IEEE 802.11s mesh networks to extend WLAN capabilities with extensive experiment configurations. The testbed is...

    Provided By Reed Elsevier

  • White Papers // Oct 2010

    A Cross-Layer Protocol of Spectrum Mobility and Handover in Cognitive LTE Networks

    Cognitive radio technique is the next step toward efficient wireless bandwidth utilization. While some of the spectrum bands (unlicensed band) have been increasingly used, most of the other spectrum resources (licensed band) are underutilized. This drives the challenges of open spectrum and dynamic spectrum access concepts, which allows unlicensed users...

    Provided By Reed Elsevier

  • White Papers // Aug 2010

    Performance Evaluation of the Fractional Wavelet Filter: A Low-Memory Image Wavelet Transform for Multimedia Sensor Networks

    Existing image wavelet transform techniques exceed the computational and memory resources of low-complexity wireless sensor nodes. In order to enable multimedia wireless sensors to use image wavelet transforms techniques to pre-process collected image sensor data, the authors introduce the fractional wavelet filter. The fractional wavelet filter computes the wavelet transform...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    A Novel Analysis Space for Pointer Analysis and Its Application for Bug Finding

    The size of today's programs continues to grow, as does the number of bugs they contain. Testing alone is rarely able to flush out all bugs, and many lurk in difficult-to-test corner cases. An important alternative is static analysis, in which correctness properties of a program are checked without running...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    An Architecture-Driven Software Mobility Framework

    Software architecture has been shown to provide an appropriate level of granularity for assessing a software system's quality attributes (e.g., performance and dependability). Similarly, previous research has adopted an architecture-centric approach to reasoning about and managing the run-time adaptation of software systems. For mobile and pervasive software systems, which are...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    R-Code: Network Coding-Based Reliable Broadcast in Wireless Mesh Networks

    Broadcast is an important communication primitive in Wireless Mesh Networks (WMNs). Applications like network-wide software updates require reliable broadcast to ensure that every node in the network receives the information completely and correctly. With underlying unreliable wireless links, a key challenge in implementing reliable broadcast in WMNs is to achieve...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    Seeing Is Believing: Trustworthiness as a Dynamic Belief

    Recent efforts to understand the mechanisms underlying human cooperation have focused on the notion of trust, with research illustrating that both initial impressions and previous interactions impact the amount of trust people place in a partner. Less is known, however, about how these two types of information interact in iterated...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    A Parallel Evolutionary Algorithm to Optimize Dynamic Memory Managers in Embedded Systems

    For the last 30 years, several Dynamic Memory Managers (DMMs) have been proposed. Such DMMs include first fit, best fit, segregated fit and buddy systems. Since the performance, memory usage and energy consumption of each DMM differs, software engineers often face difficult choices in selecting the most suitable approach for...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    ABS: Adaptive Buffer Sizing for Heterogeneous Networks

    Most existing criteria for sizing router buffers rely on explicit formulation of the relationship between buffer size and characteristics of Internet traffic. However, this is a non-trivial, if not impossible, task given that the number of flows, their individual RTTs, and congestion control methods, as well as flow responsiveness, are...

    Provided By Reed Elsevier

  • White Papers // Oct 2009

    Queuing Dynamics and Single-Link Stability of Delay-Based Window Congestion Control

    Accurate modeling of queuing dynamics is important in the design and analysis of Internet congestion control. However, as demonstrated in this paper, existing window-based queuing models are often not capable of precisely capturing the transient behavior (i.e., self-clocking and burstiness) of TCP-like protocols and their resulting analysis may be inaccurate...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Effects of MDMA, Methamphetamine and Methylphenidate on Repeated Acquisition and Performance in Rats

    Repeated-acquisition procedures that include performance controls for effects not specific to acquisition permit the assessment of drug effects on learning on a within-subject, within-session basis. Despite the advantages of this methodology, few studies have examined effects of psychomotor stimulants on repeated acquisition in rodents. The purpose of the present paper...

    Provided By Reed Elsevier

  • White Papers // Oct 2010

    Advanced Hashing Schemes for Packet Forwarding Using Set Associative Memory Architectures

    Building a high performance IP Packet Forwarding (PF) engine remains a challenge due to increasingly stringent throughput requirements and the growing size of IP forwarding tables. The router has to match the incoming packet's IP address against all entries in the forwarding table. The matching process has to be done...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    HiFIND: A High-Speed Flow-Level Intrusion Detection Approach With DoS Resiliency

    Global-scale attacks like worms and botnets are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hosts. In this paper, leveraging data streaming techniques such as the reversible sketch, the authors design HiFIND, a High-speed Flow-level Intrusion Detection system. In contrast to...

    Provided By Reed Elsevier

  • White Papers // Dec 2009

    Iterative Execution-Feedback Model-Directed GUI Testing

    Current fully automatic model-based test-case generation techniques for GUIs employ a static model. Therefore they are unable to leverage certain state-based relationships between GUI events (e.g., one enables the other, one alters the other's execution) that are revealed at run-time and non-trivial to infer statically. The authors present ALT -...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    Trust in Collaborative Web Applications

    Collaborative functionality is increasingly prevalent in web applications. Such functionality permits individuals to add - and sometimes modify - web content, often with minimal barriers-to-entry. Ideally, large bodies of knowledge can be amassed and shared in this manner. However, such software also provides a medium for nefarious persons to operate....

    Provided By Reed Elsevier

  • White Papers // Jul 2009

    Connectivity Monitoring in Wireless Sensor Networks

    In traditional network management, network topology is one of the key parameters that needs to be known in order to perform operations like performance management, fault detection and isolation, and capacity planning. Large displays showing the network topology are common sights in Network Operation Centers (NOC). In the Internet, despite...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Cloud Computing for Education: A New Dawn?

    Educational establishments continue to seek opportunities to rationalize the way they manage their resources. The economic crisis that befell the world following the near collapse of the global financial system and the subsequent bailouts of local banks with billions of tax payers' money will continue to affect educational establishments that...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Reputation-Based Dependable Scheduling of Workflow Applications in Peer-to-Peer Grids

    Grids facilitate creation of wide-area collaborative environment for sharing computing or storage resources and various applications. Inter-connecting distributed Grid sites through peer-to-peer routing and information dissemination structure (also known as peer-to-peer Grids) is essential to avoid the problems of scheduling efficiency bottleneck and single point of failure in the centralized...

    Provided By Reed Elsevier

  • White Papers // Apr 2010

    A Performance Analysis of Block ACK Scheme for IEEE 802.11e Networks

    The demand for the IEEE 802.11 Wireless Local-Area Networks (WLANs) has been drastically increasing along with many emerging applications and services over WLAN. However, the IEEE 802.11 Medium Access Control (MAC) is known to be limited in terms of its throughput performance due to the high MAC overhead, such as...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Adaptive Sleep Mode Management in IEEE 802.16m Wireless Metropolitan Area Networks

    The emerging IEEE 802.16m standard provides a new sleep mode operation for Mobile Stations (MSs). It evolves from the sleep mode operation in the IEEE 802.16 standard but with more advanced features, e.g., the listening window may be extended and the sleep cycle length is adjustable. To fully exploit these...

    Provided By Reed Elsevier

  • White Papers // May 2010

    An Elasticity Model for High Throughput Computing Clusters

    Different methods have been proposed to dynamically provide scientific applications with execution environments that hide the complexity of distributed infrastructures. Recently virtualization has emerged as a promising technology to provide such environments. In this paper, the authors present a generic cluster architecture that extends the classical benefits of virtual machines...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    Joint QoS Multicast Routing and Channel Assignment in Multiradio Multichannel Wireless Mesh Networks Using Intelligent Computational Methods

    In this paper, the Quality of Service Multicast Routing and Channel Assignment (QoS-MRCA) problem is investigated. It is proved to be a NP-hard problem. Previous work separates the multicast tree construction from the channel assignment. Therefore, they bear severe drawback that is, channel assignment cannot work well with the determined...

    Provided By Reed Elsevier

  • White Papers // Nov 2009

    Survey on Anonymous Communications in Computer Networks

    Anonymous communications aim to preserve communications privacy within the shared public network environment. It can provide security well beyond content privacy and integrity. The scientific studies of anonymous communications are largely originated from Chaum's two seminal approaches: mixnet and DC-net. In this paper, the authors present an overview of the...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    VPAL: Video Packet Adaptation Layer for Reliable Video Multicast Over IEEE 802.11n WLAN

    In this paper, the authors propose a scheme, called Video Packet Adaptation Layer (VPAL), for reliable video multicast over the IEEE 802.11n WLAN. VPAL is composed of raptor coding for reliable video transmission, header compression and packet aggregation, both for efficient video transmission. Most of the VPAL functionalities reside above...

    Provided By Reed Elsevier

  • White Papers // Jun 2010

    An Efficient and Lightweight Method for Service Level Agreement Assessment

    Traditional approaches to on-line end-to-end Service Level Agreement (SLA) assessment have focused on the estimation of network QoS parameters. These approaches, however, face a trade-off between accuracy and the amount of resources needed to achieve such accuracy. This paper offers an alternative approach, where instead of estimating QoS parameters, the...

    Provided By Reed Elsevier